High severity7.5NVD Advisory· Published Apr 21, 2026· Updated Apr 24, 2026
CVE-2026-40879
CVE-2026-40879
Description
Nest is a framework for building scalable Node.js server-side applications. Prior to 11.1.19, when an attacker sends many small, valid JSON messages in one TCP frame, handleData() recurses once per message; the buffer shrinks each call. maxBufferSize is never reached; call stack overflows instead. A ~47 KB payload is sufficient to trigger RangeError. This vulnerability is fixed in 11.1.19.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@nestjs/microservicesnpm | < 11.1.19 | 11.1.19 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-hpwf-8g29-85qmghsaADVISORY
- github.com/nestjs/nest/security/advisories/GHSA-hpwf-8g29-85qmnvdVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-40879ghsaADVISORY
News mentions
0No linked articles in our index yet.